Abstract
Cyber-physical systems are widely used. Nevertheless, security issues are quite acute for them. First of all, because the system must work constantly without downtime and failures. The Cyber-Physical System (CPS) must quickly transfer the parameters to the monitoring system, but if the system is not flexible enough, fast and optimal, then collisions and additional loads on the CPS may occur. This study proposes a system for monitoring and detecting anomalies for CPS based on the principles of trust, which allows you to verify the correctness of the system and detect possible anomalies. In our study, we focus on traffic analysis and analysis of the CPU operation, since these parameters are the most critical in the operation of the CPS itself. The technique is based on computationally simple algorithms and allows to analyze the basic parameters that are typical for most CPS. These factors make it highly scalable and applicable to various types of CPS, despite the fragmentation and a large number of architectures. A distributed application architecture was developed for monitoring and analyzing trust in the CPS. The calculation results show the possibility of detecting the consequences of the influences of denial-of-service attacks or CPS. In this case, three basic parameters are sufficient for detection. Thus, one of the features of the system is reflexivity in detecting anomalies, that is, we force devices to independently analyze their behavior and make a decision about the presence of anomalies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Choi, S., Woo, J., Kim, J., Lee, J.Y.: Digital twin-based integrated monitoring system: korean application cases. Sensors 22, 5450 (2022). https://doi.org/10.3390/s22145450
Yang, B., Xin, L., Long, Z.: An improved residual-based detection method for stealthy anomalies on mobile robots. Machines 10, 446 (2022). https://doi.org/10.3390/machines10060446
Kotenko, I.V.: Primenenie tekhnologii upravleniya informaciej i sobytiyami bezopasnosti dlya zashchity informacii v kriticheski vazhnyh infrastrukturah. Trudy SPIIRAN Vyp 1, 2–7 (2012)
Lavrova, D.S., Zaitseva, E.A., Zegzhda, D.P.: Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time. Autom. Control. Comput. Sci. 53(5), 387–392 (2019). https://doi.org/10.3103/S0146411619050067
Stevens, M.: Security Information and Event Management (SIEM). In Proceedings of the NEbraska CERT Conference, Omaha, NE, USA, 9–11 August 2005. http://www.certconf.org/presentations/2005/files/WC4.pdf
Knapp, E.D., Langill, J.T.: Chapter 12-Security Monitoring of Industrial Control Systems. In: Eric, D., Knapp, J.T. (eds.) Industrial Network Security, 2nd ed., pp. 351–386. Syngress, New York (2015)
Lavrova, D.S.: Podhod k razrabotke SIEM-sistemy dlya Interneta veshchej. Probl. Inf. Bezopasnosti. Komp’yuternye Sist. 2, 51–59 (2016)
Siddiqui, S., Khan, M.S., Ferens, K., Kinsner, W.: Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats. In: Proceedings of the 2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC), Oxford, UK, 26–28 July 2017; pp. 297–308 (2017)
Wang, C., Wang, D., Xu, G., He, D.: Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci. China Inf. Sci. 65(1), 1–15 (2021). https://doi.org/10.1007/s11432-020-2975-6
Jiang, Y., Yin, S., Kaynak, O.: Data-driven monitoring and safety control of industrial cyber-physical systems: basics and beyond. IEEE Access 6, 47374–47384 (2018)
Poltavtseva, M., Shelupanov, A., Bragin, D., Zegzhda, D., Alexandrova, E.: Key concepts of systemological approach to CPS adaptive information security monitoring. Symmetry 13, 2425 (2021). https://doi.org/10.3390/sym13122425
Duhayyim, M.A., et al.: Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system. Appl. Sci. 12, 6875 (2022). https://doi.org/10.3390/app12146875/
Thakur, S., Chakraborty, A., De, R., Kumar, N., Sarkar, R.: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Comput. Electr. Eng. 91, 107044 (2021)
Sauer, F., Niedermaier, M., Kiebling, S., et al.: LICSTER – a low-cost ICS security testbed for education and research. In: 6th International Symposium for ICS & SCADA Cyber Security Research (2019). https://doi.org/10.14236/ewic/icscsr19.1
Gamec, J., Basan, E., Basan, A., Nekrasov, A., Fidge, C., Sushkin, N.: An adaptive protection system for sensor networks based on analysis of neighboring nodes. Sensors 21, 6116 (2021). https://doi.org/10.3390/s21186116
Basan, E., Basan, A., Nekrasov, A.: Method for detecting abnormal activity in a group of mobile robots. Sensors 19, 4007 (2019). https://doi.org/10.3390/s19184007/
Basan, E., Basan, A., Makarevich, O.: Detection of anomalies in the robotic system based on the calculation of kullback-leibler divergence. In: 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2019, pp. 337-340 (2019). https://doi.org/10.1109/CyberC.2019.00064
Acknowledgments
The research was supported by the Council for Grants of the President of the Russian Federation at the expense of the scholarship of the President of the Russian Federation for young scientists and graduate students (Competition SP-2022) No. SP-858.2022.5 on the topic “Technology for ensuring cybersecurity of automated systems from active information attacks based on the principle of reflection”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Basan, E., Lapina, M., Lesnikov, A., Basyuk, A., Mogilny, A. (2023). Trust Monitoring in a Cyber-Physical System for Security Analysis Based on Distributed Computing. In: Alikhanov, A., Lyakhov, P., Samoylenko, I. (eds) Current Problems in Applied Mathematics and Computer Science and Systems. APAMCS 2022. Lecture Notes in Networks and Systems, vol 702. Springer, Cham. https://doi.org/10.1007/978-3-031-34127-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-031-34127-4_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34126-7
Online ISBN: 978-3-031-34127-4
eBook Packages: EngineeringEngineering (R0)